'Brute Force Attack' on an Undeciphered Writing System

'Brute Force Attack' on an Undeciphered Writing System

Cryptanalysis and Language Deciphering: A 'Brute Force Attack' on an Undeciphered Writing System Loh Jia Sheng Colin Dr Perono Cacciafoco, Francesco Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A 'Brute Force Attack' on an Undeciphered Writing System1 / 24 Content Outline Background on Linear A as an Ancient Writing System Python as a powerful programming language Overview of the Linear A decipherment Python program Visual representation of how the Python program works References and acknowledgement Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A 'Brute Force Attack' on an Undeciphered Writing System2 / 24 Introduction Linear A Linear A is one of the writing systems of the Ancient Aegean Minoan civilization of Crete, dating back to the Bronze Age. Despite many past attempts by scholars, glyph-breakers and linguists, Linear A continues to remain undeciphered due to its elusive underlying language Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A 'Brute Force Attack' on an Undeciphered Writing System3 / 24 Linear A Background Linear A has around 90 signs/ symbols in regular use, where a large majority of them are considered distinct when compared to Linear B. Source Linear A symbols and inscriptions are found on a variety of artefacts which includes roundels, tablets and seals that indicate economic transactions. Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A 'Brute Force Attack' on an Undeciphered Writing System4 / 24 Linear A Background Linear A has around 90 signs/ symbols in regular use, where a large majority of them are considered distinct when compared to Linear B. Source Linear A symbols and inscriptions are found on a variety of artefacts which includes roundels, tablets and seals that indicate economic transactions. Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A 'Brute Force Attack' on an Undeciphered Writing System4 / 24 Linear A tablets Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A 'Brute Force Attack' on an Undeciphered Writing System5 / 24 Linear B syllabary Figure: Linear B syllabary, deciphered by Michael Ventris in 1952 Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A 'Brute Force Attack' on an Undeciphered Writing System6 / 24 Linear A Attempts to decipher Linear A Many attempted to decipher Linear A by assigning Linear B phonetic values to Linear A signs that appear graphically similar. Flaws in past decipherments Linear B encodes Mycenaean Greek whereas Linear A encodes Aegean Minoan. There is a disproportionate time difference between the use of each writing system.Furthermore, close to 80% of Linear A symbols are unique to that of Linear B. Recent studies Recent studies on the decipherment on Linear A has proposed that Linear A could have relations with other languages such as Luwian and various language families such as the Semitic language family, Indo-European language family and even the Afro-Asiatic language family. Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A 'Brute Force Attack' on an Undeciphered Writing System7 / 24 Linear A Attempts to decipher Linear A Many attempted to decipher Linear A by assigning Linear B phonetic values to Linear A signs that appear graphically similar. Flaws in past decipherments Linear B encodes Mycenaean Greek whereas Linear A encodes Aegean Minoan. There is a disproportionate time difference between the use of each writing system.Furthermore, close to 80% of Linear A symbols are unique to that of Linear B. Recent studies Recent studies on the decipherment on Linear A has proposed that Linear A could have relations with other languages such as Luwian and various language families such as the Semitic language family, Indo-European language family and even the Afro-Asiatic language family. Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A 'Brute Force Attack' on an Undeciphered Writing System7 / 24 Linear A Attempts to decipher Linear A Many attempted to decipher Linear A by assigning Linear B phonetic values to Linear A signs that appear graphically similar. Flaws in past decipherments Linear B encodes Mycenaean Greek whereas Linear A encodes Aegean Minoan. There is a disproportionate time difference between the use of each writing system.Furthermore, close to 80% of Linear A symbols are unique to that of Linear B. Recent studies Recent studies on the decipherment on Linear A has proposed that Linear A could have relations with other languages such as Luwian and various language families such as the Semitic language family, Indo-European language family and even the Afro-Asiatic language family. Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A 'Brute Force Attack' on an Undeciphered Writing System7 / 24 Aim Programming With the computational power of programming, we aim to develop a software that is able to isolate significant clusters of Linear A symbols while attempt to reconstruct the Minoan phonetics. Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A 'Brute Force Attack' on an Undeciphered Writing System8 / 24 Python Python is one of the most popular programming language. Python can serve as cross-compliers to other programming languages such as Javascript, while having various implementations. Data analytics using Python module 'pandas' Creation of computer graphical user interface (GUI) using Python module 'PyQt' Web application design using Python module 'Flask' Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A 'Brute Force Attack' on an Undeciphered Writing System9 / 24 Python Python is one of the most popular programming language. Python can serve as cross-compliers to other programming languages such as Javascript, while having various implementations. Data analytics using Python module 'pandas' Creation of computer graphical user interface (GUI) using Python module 'PyQt' Web application design using Python module 'Flask' Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A 'Brute Force Attack' on an Undeciphered Writing System9 / 24 Python Program Python modules Our research team has adopted 'pandas' and 'PyQt' to be the two main Python modules used for our Python program. Python program To start off, the Python program can be segmented into 'Specific Decipherment' and 'General Decipherment'. Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A 'Brute Force Attack' on an Undeciphered Writing10 System / 24 Specific Decipherment - Overview Overview Incorporate the comparison of numerous language dictionaries with our Linear A master list, comprised of GORILA 1 - 5. Basis of Comparison Basis of comparison would be identical matches between Linear A words, and the words in the dictionaries, after having the vowels removed. Results Results will be displayed in a clear table format with four columns. 'Identical Matches' - Strings with a one-to-one character match 'Linear A word' - Original Linear A word, without any modifications. 'Source' - Tablet source which the original Linear A word can be found. 'Dictionary Word' - the original word from the dictionary of interest. Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A 'Brute Force Attack' on an Undeciphered Writing11 System / 24 Specific Decipherment - Overview Overview Incorporate the comparison of numerous language dictionaries with our Linear A master list, comprised of GORILA 1 - 5. Basis of Comparison Basis of comparison would be identical matches between Linear A words, and the words in the dictionaries, after having the vowels removed. Results Results will be displayed in a clear table format with four columns. 'Identical Matches' - Strings with a one-to-one character match 'Linear A word' - Original Linear A word, without any modifications. 'Source' - Tablet source which the original Linear A word can be found. 'Dictionary Word' - the original word from the dictionary of interest. Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A 'Brute Force Attack' on an Undeciphered Writing11 System / 24 Specific Decipherment - Overview Overview Incorporate the comparison of numerous language dictionaries with our Linear A master list, comprised of GORILA 1 - 5. Basis of Comparison Basis of comparison would be identical matches between Linear A words, and the words in the dictionaries, after having the vowels removed. Results Results will be displayed in a clear table format with four columns. 'Identical Matches' - Strings with a one-to-one character match 'Linear A word' - Original Linear A word, without any modifications. 'Source' - Tablet source which the original Linear A word can be found. 'Dictionary Word' - the original word from the dictionary of interest. Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A 'Brute Force Attack' on an Undeciphered Writing11 System / 24 Specific Decipherment - Visual Specific Decipherment Results Page Specific Decipherment Front Page Loh Jia Sheng ColinDr Perono Cacciafoco, FrancescoCryptanalysis and Language Deciphering: A 'Brute Force Attack' on an Undeciphered Writing12

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    37 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us